Hsu-Chun Hsiao

Orcid: 0000-0001-9592-6911

According to our database1, Hsu-Chun Hsiao authored at least 55 papers between 2009 and 2023.

Collaborative distances:
  • Dijkstra number2 of four.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2023
ALBUS: a Probabilistic Monitoring Algorithm to Counter Burst-Flood Attacks.
Proceedings of the 42nd International Symposium on Reliable Distributed Systems, 2023

Capturing Antique Browsers in Modern Devices: A Security Analysis of Captive Portal Mini-Browsers.
Proceedings of the Applied Cryptography and Network Security, 2023

2022
OmniCrawl: Comprehensive Measurement of Web Tracking With Real Desktop and Mobile Browsers.
Proc. Priv. Enhancing Technol., 2022

Investigating Advertisers' Domain-changing Behaviors and Their Impacts on Ad-blocker Filter Lists.
Proceedings of the WWW '22: The ACM Web Conference 2022, Virtual Event, Lyon, France, April 25, 2022

Know Your Victim: Tor Browser Setting Identification via Network Traffic Analysis.
Proceedings of the Companion of The Web Conference 2022, Virtual Event / Lyon, France, April 25, 2022

HeadStart: Efficiently Verifiable and Low-Latency Participatory Randomness Generation at Scale.
Proceedings of the 29th Annual Network and Distributed System Security Symposium, 2022

Tool: An Efficient and Flexible Simulator for Byzantine Fault-Tolerant Protocols.
Proceedings of the 52nd Annual IEEE/IFIP International Conference on Dependable Systems and Networks, 2022

LAEG: Leak-based AEG using Dynamic Binary Analysis to Defeat ASLR.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2022

"Prove It!" A User Centered Design for the Blockchain-Based Research Lifecycle Transparency Framework.
Proceedings of the Crisis, Transition, Resilience: Re-imagining an information resilient society, 2022

2021
Low-Rate Overuse Flow Tracer (LOFT): An Efficient and Scalable Algorithm for Detecting Overuse Flows.
Proceedings of the 40th International Symposium on Reliable Distributed Systems, 2021

Speed Records in Network Flow Measurement on FPGA.
Proceedings of the 31st International Conference on Field-Programmable Logic and Applications, 2021

ProMutator: Detecting Vulnerable Price Oracles in DeFi by Mutated Transactions.
Proceedings of the IEEE European Symposium on Security and Privacy Workshops, 2021

2020
An Empirical Evaluation of Bluetooth-based Decentralized Contact Tracing in Crowds.
CoRR, 2020

Practical and Verifiable Electronic Sortition.
CoRR, 2020

Hybrid-Voting: A Hybrid Structured Electronic Voting System.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

Keeping Passwords In Your Pocket: Managing Password Locally With Mobile Fingerprint Sensors.
Proceedings of the Companion of The 2020 Web Conference 2020, 2020

On Using Camera-based Visible Light Communication for Security Protocols.
Proceedings of the 2020 IEEE Security and Privacy Workshops, 2020

FALCO: Detecting Superfluous JavaScript Injection Attacks using Website Fingerprints.
Proceedings of the 17th International Joint Conference on e-Business and Telecommunications, 2020

On the Privacy Risks of Compromised Trigger-Action Platforms.
Proceedings of the Computer Security - ESORICS 2020, 2020

Poster: Challenges in Stopping Ticket Scalping Bots.
Proceedings of the ASIA CCS '20: The 15th ACM Asia Conference on Computer and Communications Security, 2020

2019
SafeChain: Securing Trigger-Action Programming From Attack Chains.
IEEE Trans. Inf. Forensics Secur., 2019

SAFECHAIN: Securing Trigger-Action Programming from Attack Chains (Extended Technical Report).
CoRR, 2019

An Investigation of Cyber Autonomy on Government Websites.
Proceedings of the World Wide Web Conference, 2019

On the Feasibility of Rerouting-Based DDoS Defenses.
Proceedings of the 2019 IEEE Symposium on Security and Privacy, 2019

2018
GroupIt: Lightweight Group Key Management for Dynamic IoT Environments.
IEEE Internet Things J., 2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core (Technical Report).
CoRR, 2018

DAMUP: Practical and privacy-aware cloud-based DDoS mitigation.
Proceedings of the 2018 IEEE/IFIP Network Operations and Management Symposium, 2018

SDNProbe: Lightweight Fault Localization in the Error-Prone Environment.
Proceedings of the 38th IEEE International Conference on Distributed Computing Systems, 2018

Dynamic Path Pruning in Symbolic Execution.
Proceedings of the IEEE Conference on Dependable and Secure Computing, 2018

CLEF: Limiting the Damage Caused by Large Flows in the Internet Core.
Proceedings of the Cryptology and Network Security - 17th International Conference, 2018

2017
Traffic-Aware Patching for Cyber Security in Mobile IoT.
IEEE Commun. Mag., 2017

Security Implications of Redirection Trail in Popular Websites Worldwide.
Proceedings of the 26th International Conference on World Wide Web, 2017

2016
Decapitation via digital epidemics: a bio-inspired transmissive attack.
IEEE Commun. Mag., 2016

Insider Collusion Attack on Privacy-Preserving Kernel-Based Data Mining Systems.
IEEE Access, 2016

SandUSB: An installation-free sandbox for USB peripherals.
Proceedings of the 3rd IEEE World Forum on Internet of Things, 2016

Securing data planes in software-defined networks.
Proceedings of the IEEE NetSoft Conference and Workshops, 2016

SIBRA: Scalable Internet Bandwidth Reservation Architecture.
Proceedings of the 23rd Annual Network and Distributed System Security Symposium, 2016

CICADAS: Congesting the Internet with Coordinated and Decentralized Pulsating Attacks.
Proceedings of the 11th ACM on Asia Conference on Computer and Communications Security, 2016

Migrant Attack: A Multi-resource DoS Attack on Cloud Virtual Machine Migration Schemes.
Proceedings of the 11th Asia Joint Conference on Information Security, 2016

2015
A Practical System for Guaranteed Access in the Presence of DDoS Attacks and Flash Crowds.
Proceedings of the 23rd IEEE International Conference on Network Protocols, 2015

2014
Toward A Highly Available Future Internet.
PhD thesis, 2014

XIA: architecting a more trustworthy and evolvable internet.
Comput. Commun. Rev., 2014

Efficient Large Flow Detection over Arbitrary Windows: An Algorithm Exact Outside an Ambiguity Region.
Proceedings of the 2014 Internet Measurement Conference, 2014

YourPassword: applying feedback loops to improve security behavior of managing multiple passwords.
Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security, 2014

2013
Policy-based Secure Deletion.
IACR Cryptol. ePrint Arch., 2013

STRIDE: sanctuary trail - refuge from internet DDoS entrapment.
Proceedings of the 8th ACM Symposium on Information, Computer and Communications Security, 2013

2012
LAP: Lightweight Anonymity and Privacy.
Proceedings of the IEEE Symposium on Security and Privacy, 2012

ShortMAC: Efficient Data-Plane Fault Localization.
Proceedings of the 19th Annual Network and Distributed System Security Symposium, 2012

2011
Secure Distributed Data Aggregation.
Found. Trends Databases, 2011

Efficient and secure threshold-based event validation for VANETs.
Proceedings of the Fourth ACM Conference on Wireless Network Security, 2011

SCION: Scalability, Control, and Isolation on Next-Generation Networks.
Proceedings of the 32nd IEEE Symposium on Security and Privacy, 2011

Flooding-resilient broadcast authentication for VANETs.
Proceedings of the 17th Annual International Conference on Mobile Computing and Networking, 2011

2010
SPATE: Small-Group PKI-Less Authenticated Trust Establishment.
IEEE Trans. Mob. Comput., 2010

2009
SPATE: small-group PKI-less authenticated trust establishment.
Proceedings of the 7th International Conference on Mobile Systems, 2009

A Study of User-Friendly Hash Comparison Schemes.
Proceedings of the Twenty-Fifth Annual Computer Security Applications Conference, 2009


  Loading...